최신 312-39 무료덤프 - EC-COUNCIL Certified SOC Analyst (CSA)

Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.

What does this event log indicate?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following process refers to the discarding of the packets at the routing level without informing the source that the data did not reach its intended recipient?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following formula represents the risk?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company's URL as follows:
http://technosoft.com.com/<script>alert("WARNING: The application has encountered an error");</script>.
Identify the attack demonstrated in the above scenario.

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following data source will a SOC Analyst use to monitor connections to the insecure ports?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following command is used to enable logging in iptables?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
What does [-n] in the following checkpoint firewall log syntax represents?
fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

정답: C
설명: (DumpTOP 회원만 볼 수 있음)

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기